CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation of a high-severity security flaw impacting Gogs by adding it to its Known Exploited Vulnerabilities (KEV) catalog.
The vulnerability, tracked as CVE-2025… Continue reading CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Posted in Uncategorized

Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience

In this Help Net Security interview, Liad Shnell, CISO and CTO at Rakuten Viber, discusses how messaging platforms have become critical infrastructure during crises and conflicts. He explains how it influences cybersecurity priorities, from encryption … Continue reading Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience

India demands crypto outfits geolocate customers, get a selfie to prove they’re real

Government is fed up with bad actors using digi-cash to fund dodgy deeds India’s government has updated the regulations it imposes on cryptocurrency services providers, as part of its efforts to combat fraud, money laundering, and terrorism.… Continue reading India demands crypto outfits geolocate customers, get a selfie to prove they’re real

Posted in Uncategorized

India demands crypto outfits geolocate customers, get a selfie to prove they’re real

Government is fed up with bad actors using digi-cash to fund dodgy deeds India’s government has updated the regulations it imposes on cryptocurrency services providers, as part of its efforts to combat fraud, money laundering, and terrorism.… Continue reading India demands crypto outfits geolocate customers, get a selfie to prove they’re real

Posted in Uncategorized